Protecting Yourself from Keyloggers

Keylogging is another way identity thieves can steal your personal information. This technique involves the adversary, without your knowledge (sometimes via malware), installing software on your device that captures the information and keystrokes you enter on your device and sends them to the adversary. Needless to say, in no time they will have the usernames and passphrases for a number of your accounts.

Top Tip – Some employers use keylogging software to monitor their employees. In addition, computer forensic experts are trained to install keyloggers as part of investigations, including in advance of a device being seized, in order to capture as much information as possible, including account passphrases.

There are also hardware keyloggers which can avoid detection by anti-malware apps. Hardware keyloggers can take many forms. They can be a small device secretly installed between the end of your keyboard cord and its port at the back of your desktop computer. Keyloggers can also be a separate device that looks similar to a small USB memory stick plugged into one of your available USB ports.

You can thwart the risk posed by keyloggers with a number of tools, including SpyShelter (14-day free trial). It detects if any keylogging software or any keylogging type activities are present on your device and will purge them for you.